Sciweavers

1239 search results - page 105 / 248
» Techniques for the Design of Java Operating Systems
Sort
View
CDES
2006
62views Hardware» more  CDES 2006»
13 years 9 months ago
On the Management of Object Interrelationships
Still one of the main problems in computing security is the scope malicious intruders can gain by introducing their own thread of control. To make this worse, coarse grained struc...
Martin Uhl, Werner Held
LISA
2007
13 years 10 months ago
OS Circular: Internet Client for Reference
OS Circular is a framework for Internet Disk Image Distribution of software for virtual machines, those which offer a ‘‘virtualized’’ common PC environment on any PC. OS i...
Kuniyasu Suzaki, Toshiki Yagi, Kengo Iijima, Anh-Q...
FAST
2008
13 years 10 months ago
Parity Lost and Parity Regained
RAID storage systems protect data from storage errors, such as data corruption, using a set of one or more integrity techniques, such as checksums. The exact protection offered by...
Andrew Krioukov, Lakshmi N. Bairavasundaram, Garth...
HPDC
1999
IEEE
14 years 9 days ago
Process Hijacking
Process checkpointing is a basic mechanism required for providing High Throughput Computing service on distributively owned resources. We present a new process checkpoint and migr...
Victor C. Zandy, Barton P. Miller, Miron Livny
BMCBI
2011
13 years 3 months ago
ATAQS: A computational software tool for high throughput transition optimization and validation for selected reaction monitoring
Background: Since its inception, proteomics has essentially operated in a discovery mode with the goal of identifying and quantifying the maximal number of proteins in a sample. I...
Mi-Youn K. Brusniak, Sung-Tat Kwok, Mark Christian...